نتایج جستجو برای: computer security

تعداد نتایج: 723551  

Journal: :CoRR 2009
Dhananjay R. Kalbande G. T. Thampi Manish Singh

A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. it becomes difficult for any security system to block all types of attacks. this gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss an...

Journal: :Applied ergonomics 2007
Sara Kraemer Pascale Carayon

This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to com...

2015
Franziska Roesner

As our world becomes more computerized and interconnected, computer security and privacy will continue to increase in importance. In this paper, I overview several computer security and privacy challenges faced by end users of the technologies we build, and how we can design and build technologies that better match user expectations with respect to security and privacy. I close with open challe...

2006
Raj Gururajan Vijaya Gururajan

Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures. While these external guidelines make recommendations as to how an organisation should develop and implement best practices in computer security they often fail to provide a mechanism that links th...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

2005
Rainer Böhme

Vulnerabilities are errors in computer systems which can be exploited to breach security mechanisms. Such information can be very valuable as it decides about the success of attack or defense in computer networks. This essay introduces into the economic perspective on computer security and discusses the advantages and drawbacks of different concepts for vulnerability markets, where security-rel...

1999
Gregory B. White

The need for computer security is commonly accepted today in government and industry. Numerous studies have shown both an increase in security incidents as well as an increase in interest by organizations to address security issues. Many security tools such as firewalls and intrusion detection systems are becoming commonplace in organizations yet intruders still are able to penetrate computer n...

2011

information security practice and experience 10th international conference ispec 2014 fuzhou china may 5-8 2014 proceedings lecture notes in computer science security and cryptology PDF advances in cryptology-asiacrypt 96 international conference on the theory and applications of crypotology and information security kyongju lecture notes in computer science PDF image analysis 17th scandinavian ...

Journal: :IJISP 2009
Lee Novakovic Tanya J. McGill Michael W. Dixon

Computer security is a major issue facing the world we inhabit. Computer systems in a multitude of institutions and organizations hold our personal information. Furthermore, we rely on the safe working of computer systems to not only protect that data, but allow us to take advantage of the benefits technology has to offer. Various kinds of security technology protect these systems. However, the...

2016
Zacheus O. Ogunwobi Sakinat O. Folorunso Omobolade Alebiosu

It has been identified that financial institutions are one of the major users of Information Technology hence the need to evaluate effective use of the computer security strategies. This study aimed at evaluating the effectiveness of computer and network security strategies employed in Nigerian banks. This study was led by the following objectives; to determine and assess the security strategie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید